Normal view MARC view

Metasploit : (Record no. 34538)

MARC details
000 -LEADER
fixed length control field 03662cam a2200433 a 4500
001 - CONTROL NUMBER
control field 34538
003 - CONTROL NUMBER IDENTIFIER
control field AE-DuAU
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20241127173134.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 110625s2011 caua 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2011020166
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781593272883 (pbk.) :
Terms of availability 49.95
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 159327288X (pbk.) :
Terms of availability 49.95
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number M4865 2011
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (OCLC)
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) QA 76.9 .A25 M4865 2011
245 00 - TITLE STATEMENT
Title Metasploit :
Remainder of title the penetration tester's guide /
Statement of responsibility, etc by David Kennedy ... [et al.].
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc San Francisco :
Name of publisher, distributor, etc No Starch Press,
Date of publication, distribution, etc c2011.
300 ## - PHYSICAL DESCRIPTION
Extent xxiv, 299 p. :
Other physical details ill. ;
Dimensions 24 cm.
336 ## - CONTENT TYPE
Source rdacontent
Content Type Term text
Content Type Code txt
337 ## - MEDIA TYPE
Source rdamedia
Media Type Term unmediated
Media Type Code n
338 ## - CARRIER TYPE
Source rdacarrier
Carrier Type Term volume
Carrier Type Code nc
500 ## - GENERAL NOTE
General note Includes index.
520 ## - SUMMARY, ETC.
Summary, etc "The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, documentation is lacking and the tool can be hard to grasp for first-time users. Metasploit: A Penetration Tester's Guide fills this gap by teaching you how to harness the Framework, use its many features, and interact with the vibrant community of Metasploit contributors. The authors begin by building a foundation for penetration testing and establishing a fundamental methodology. From there, they explain the Framework's conventions, interfaces, and module system, as they show you how to assess networks with Metasploit by launching simulated attacks. Having mastered the essentials, you'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, devastating wireless attacks, and targeted social engineering attacks. Metasploit: A Penetration Tester's Guide will teach you how to: Find and exploit unmaintained, misconfigured, and unpatched systems Perform reconnaissance and find valuable information about your target Bypass anti-virus technologies and circumvent security controls Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery Use the Meterpreter shell to launch further attacks from inside the network Harness standalone Metasploit utilities, third-party tools, and plug-ins Learn how to write your own Meterpreter post exploitation modules and scripts You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to make your own networks more secure or to put someone else's to the test, Metasploit: A Penetration Tester's Guide will take you there and beyond"--
-- Provided by publisher.
520 ## - SUMMARY, ETC.
Summary, etc "How to identify and exploit security vulnerabilities with Metasploit, the world's most popular penetration testing framework"--
-- Provided by publisher.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computers
General subdivision Access control.
9 (RLIN) 110926
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Penetration testing (Computer security)
9 (RLIN) 110928
630 00 - SUBJECT ADDED ENTRY--UNIFORM TITLE
Uniform title Metasploit (Electronic resource)
9 (RLIN) 110929
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures
-- Testing.
9 (RLIN) 110931
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS / Internet / Security.
Source of heading or term bisacsh.
9 (RLIN) 110933
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS / Security / Viruses.
Source of heading or term bisacsh.
9 (RLIN) 110934
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS / Security / General.
Source of heading or term bisacsh.
9 (RLIN) 110937
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS / Internet / General.
Source of heading or term bisacsh.
9 (RLIN) 110939
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Kennedy, David,
Dates associated with a name 1982-
9 (RLIN) 110941
852 1# - LOCATION/CALL NUMBER
-- P49.95usd
907 ## - LOCAL DATA ELEMENT G, LDG (RLIN)
a
b 02-06-12
c 01-26-12
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Books
998 ## - LOCAL CONTROL INFORMATION (RLIN)
-- audmc
Operator's initials, OID (RLIN) 01-26-12
Cataloger's initials, CIN (RLIN) m
First Date, FD (RLIN) a
-- -
-- eng
-- cau
-- 0
945 ## - LOCAL PROCESSING INFORMATION (OCLC)
g 0
i 5056869
j 0
l audmc
o -
p 183.57
q -
r -
s -
t 1
u 0
v 0
w 0
x 0
y i13092583
z 01-26-12
Holdings
Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Cost, normal purchase price Total Checkouts Full call number Barcode Date last seen Cost, replacement price Price effective from Koha item type
  Library of Congress Classification     American University in Dubai American University in Dubai Main Collection 2012-01-26 183.57   QA 76.9 .A25 M4865 2011 5056869 2023-12-01 183.57 2015-07-25 Books
  • Monday - Friday
  • 8:00 AM - 5:00 PM
  • Saturday - Sunday
  • Closed
  • Phone: +971 431 83183
  • Email: Library@aud.edu
  • Address: Sheikh Zayed Road -- P.O. Box 28282, Dubai, AE
  • Map & Directions